Cisco 200-201 Question Answer
What describes the usage of a rootkit in endpoint based attacks?
set of tools used by an attacker to maintain control of a compromised system while avoiding detection
exploit that can be used to perform remote code execution
set of vulnerabilities used by an attacker lo disable root access on the system
remote code execution that causes a denial-of-service on the system
TESTED 19 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved